GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line.
References
Link | Resource |
---|---|
https://code.launchpad.net/~mailman-coders/mailman/2.1 | Product |
https://github.com/0NYX-MY7H/CVE-2025-43920 | Exploit Third Party Advisory |
Configurations
History
24 Apr 2025, 16:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://code.launchpad.net/~mailman-coders/mailman/2.1 - Product | |
References | () https://github.com/0NYX-MY7H/CVE-2025-43920 - Exploit, Third Party Advisory | |
First Time |
Gnu mailman
Gnu |
|
CPE | cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:* |
21 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. |
20 Apr 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-20 01:15
Updated : 2025-04-24 16:20
NVD link : CVE-2025-43920
Mitre link : CVE-2025-43920
CVE.ORG link : CVE-2025-43920
JSON object : View
Products Affected
gnu
- mailman
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')